
CVE-2003-0796
https://notcve.org/view.php?id=CVE-2003-0796
10 Mar 2004 — Unknown vulnerability in rpc.mountd SGI IRIX 6.5.18 through 6.5.22 allows remote attackers to mount from unprivileged ports even with the -n option disabled. Vulnerabilidad desconocida en rpc.mountd de SGI IRIX 6.5.18 a 6.5.22 permite a atacantes remotos montar de puertos no privilegiados incluso con la opción -n deshabilitada. • ftp://patches.sgi.com/support/free/security/advisories/20031102-01-P.asc •

CVE-2003-0683
https://notcve.org/view.php?id=CVE-2003-0683
30 Oct 2003 — NFS in SGI 6.5.21m and 6.5.21f does not perform access checks in certain configurations when an /etc/exports entry uses wildcards without any hostnames or groups, which could allow attackers to bypass intended restrictions. NFS en SGI 6.5.21m y 6.5.21f no realiza comprobaciones de acceso en ciertas configuraciones cuando una entrada en /etc/exports usa comodines sin nungún nombre de máquina o grupos, lo que podría permitir a atacantes evitar la restricciones pretendidas. • ftp://patches.sgi.com/support/free/security/advisories/20031004-01-P •

CVE-2003-0694 – Sendmail SMTP Address prescan Memory Corruption
https://notcve.org/view.php?id=CVE-2003-0694
18 Sep 2003 — The prescan function in Sendmail 8.12.9 allows remote attackers to execute arbitrary code via buffer overflow attacks, as demonstrated using the parseaddr function in parseaddr.c. La función de prescan en Sendmail 8.12.9 permite a atacantes remotos ejecutar código arbitrario mediante ataques de desbordamiento de búfer, como se demostró usando la función parseaddr en parseaddr.c. • https://packetstorm.news/files/id/180502 •

CVE-2003-0680 – HexView Security Advisory 2003-09-01.01
https://notcve.org/view.php?id=CVE-2003-0680
18 Sep 2003 — Unknown vulnerability in NFS for SGI IRIX 6.5.21 and earlier may allow an NFS client to bypass read-only restrictions. Vulnerabilidad desconocida en NFS en SGI IRIX 6.5.21 y anteriores puede permitir a un cliente NFS saltarse restricciones de sólo lectura. It has been reported that under certain conditions a NFS client can avoid read-only restrictions on filesystems exported via NFS from a server running IRIX 6.5.21 and mount them in read/write mode. • ftp://patches.sgi.com/support/free/security/advisories/20030901-01-P •

CVE-2003-0688
https://notcve.org/view.php?id=CVE-2003-0688
03 Sep 2003 — The DNS map code in Sendmail 8.12.8 and earlier, when using the "enhdnsbl" feature, does not properly initialize certain data structures, which allows remote attackers to cause a denial of service (process crash) via an invalid DNS response that causes Sendmail to free incorrect data. • ftp://patches.sgi.com/support/free/security/advisories/20030803-01-P •

CVE-2003-0679
https://notcve.org/view.php?id=CVE-2003-0679
15 Aug 2003 — Unknown vulnerability in the libcpr library for the Checkpoint/Restart (cpr) system on SGI IRIX 6.5.21f and earlier allows local users to truncate or overwrite certain files. Vulnerabilidad desconocida en la librería libcpr del sistema de Punto de Comprobación/Reinicio (Checkpoint/Restart - cpr) en SGI IRIX 6.5.21f y anteriores permite a usuarios locales truncar o sobreescribir ciertos ficheros. • ftp://patches.sgi.com/support/free/security/advisories/20030802-01-P •

CVE-2003-0575 – HexView Security Advisory 2003-07-04.01
https://notcve.org/view.php?id=CVE-2003-0575
01 Aug 2003 — Heap-based buffer overflow in the name services daemon (nsd) in SGI IRIX 6.5.x through 6.5.21f, and possibly earlier versions, allows attackers to gain root privileges via the AUTH_UNIX gid list. Desbordamiento de búfer basado en el montón en el demonio de servicios de nombre (nsd) en SGI IRIX 6.5.x a 6.5.21f, y posiblemente versiones anteriores, permite a atacantes ganar privilegios de root mediante la lista gid AUTH_UNIX. It has been reported that the IRIX name services daemon nsd can be exploited in vari... • ftp://patches.sgi.com/support/free/security/advisories/20030704-01-P •

CVE-2002-1323
https://notcve.org/view.php?id=CVE-2002-1323
11 Dec 2002 — Safe.pm 2.0.7 and earlier, when used in Perl 5.8.0 and earlier, may allow attackers to break out of safe compartments in (1) Safe::reval or (2) Safe::rdo using a redefined @_ variable, which is not reset between successive calls. Safe.pm 2.0.7 y anteriores, si se usan con Perl 5.8.0 y anteriores, pueden permitir a atacantes escapar de compartimientos seguros en Safe::reval o Safe::rdo usando una variable @_ redefinida, que no es reestablecida entre llamadas sucesivas. • ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2004-007.0.txt •